0704-883-0675     |      dataprojectng@gmail.com

Comparative Study of Rule-Based and Machine Learning Approaches in Intrusion Detection: A Case Study of University of Abuja (Gwagwalada LGA, FCT Abuja)

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
With the rapid expansion of digital services in educational institutions, the risk of cyber-attacks, including unauthorized access and data breaches, has become a significant concern. The University of Abuja, located in Gwagwalada LGA, FCT Abuja, is no exception. Intrusion Detection Systems (IDS) are essential in identifying and responding to potential threats to university networks and data. Traditionally, IDS have relied on rule-based systems that use predefined rules to detect suspicious activities. However, the increasing sophistication of cyber-attacks has led to the development of Machine Learning (ML) approaches, which allow IDS to learn from patterns in network traffic and adapt to new, previously unseen threats. This study aims to compare the performance of rule-based IDS and ML-based IDS in detecting network intrusions at the University of Abuja, focusing on detection accuracy, false positive rates, and response times.

Statement of the Problem
The University of Abuja has faced several security breaches over the years, highlighting weaknesses in the existing intrusion detection system. The rule-based IDS currently in place relies on predefined patterns and often struggles to identify novel threats. Furthermore, these systems can produce a high number of false positives, leading to unnecessary alerts and inefficiencies. The university requires a more dynamic and intelligent approach to intrusion detection, which can adapt to evolving threats. Although machine learning-based IDS have shown promise, there is limited research on their effectiveness in comparison to rule-based systems in the context of university networks.

Objectives of the Study

  1. To compare the performance of rule-based and machine learning-based intrusion detection systems at the University of Abuja.
  2. To evaluate the accuracy, false positive rates, and response times of both IDS approaches in detecting intrusions.
  3. To recommend the most effective IDS approach for securing the university’s network infrastructure.

Research Questions

  1. How do rule-based and machine learning-based intrusion detection systems compare in detecting intrusions at the University of Abuja?
  2. What are the advantages and disadvantages of rule-based and machine learning-based approaches in terms of accuracy and false positives?
  3. How do rule-based and machine learning-based IDS impact the efficiency of network security management at the University of Abuja?

Research Hypotheses

  1. Machine learning-based IDS will have a higher detection accuracy and lower false positive rate compared to rule-based IDS at the University of Abuja.
  2. Machine learning-based IDS will outperform rule-based IDS in terms of response time for detecting and mitigating network intrusions.
  3. The use of machine learning-based IDS will improve the overall efficiency and effectiveness of the University of Abuja’s network security management.

Significance of the Study
This study will provide valuable insights into the application of machine learning techniques for intrusion detection in university networks. By comparing rule-based and machine learning-based approaches, the study will guide the University of Abuja in selecting the most effective IDS for protecting its network infrastructure. The findings will also contribute to the broader body of knowledge on IDS in educational institutions, with implications for other universities facing similar security challenges.

Scope and Limitations of the Study
The study will focus on the comparison of rule-based and machine learning-based intrusion detection systems at the University of Abuja, located in Gwagwalada LGA, FCT Abuja. The study will specifically evaluate the detection accuracy, false positives, and response times of both approaches in the university’s network. The study will not address other aspects of network security, such as firewalls or encryption systems.

Definitions of Terms
Intrusion Detection System (IDS): A security system designed to detect unauthorized access or attacks on a network or computer system.
Rule-Based IDS: An IDS that uses predefined rules and signatures to detect intrusions.
Machine Learning-Based IDS: An IDS that uses machine learning algorithms to analyze network traffic and detect anomalies or potential intrusions.





Related Project Materials

The Role of Community-Based Tourism in Wildlife Conservation in Gashaka Gumti National Park

Background of the Study

Community-based tourism (CBT) is a model that involves local communities in the management and development of tou...

Read more
BROADCASTING MEDIA CHANNEL; DISSEMINATION OF INTERNATIONAL NEWS A CASE STUDY OF EBS BULLETINS, EDO STATE

BACKGROUND STUDY

Communication as we know has now evolved over many centuries. The sophistication and c...

Read more
The impact of continuing education on reducing social vices in Lafia Local Government Area, Nasarawa State.

Background of the Study

Social vices such as substance abuse, criminal behavior, and other forms of deviant conduct have long troubled co...

Read more
An assessment of the effectiveness of government subsidies in Nigeria’s agriculture sector: Evidence from Kaduna State (2000–2020).

Background of the Study :
Government subsidies are critical instruments for stimulating agricultural production and ensurin...

Read more
The effect of public investment in renewable energy on poverty reduction in Nigeria: Evidence from rural electrification projects in Kaduna State (2000–2020).

Background of the study
Public investment in renewable energy, particularly through rural electrification...

Read more
THE IMPACT OF REGULATORY COMPLIANCE ON PUBLIC ACCOUNTING FIRMS

THE IMPACT OF REGULATORY COMPLIANCE ON PUBLIC ACCOUNTING FIRMS

ABSTRACT

 

The objective of this study is to eval...

Read more
The influence of class participation on STEM students’ academic performance in Tofa LGA, Kano State

Background of the Study :
Active class participation is widely regarded as a critical factor in academic success, particula...

Read more
An Appraisal of Digital Code Mixing in Nigerian Online Communication: A Comparative Study of WhatsApp Group Chats

Background of the study

Digital code mixing, the blending of multiple languages in communication, is a prevalent feature in Nigerian onli...

Read more
An Assessment of the Effectiveness of Pediatric Emergency Care Services in Kebbi State

Background of the Study

Pediatric emergency care is a critical component of healthcare, as it provide...

Read more
THE IMPACT OF TRADE UNIONISM ON THE GROWTH OF PUBLIC SECTOR ORGANIZATION IN NIGERIA

ABSTRACT

This subject of labour unrest has been a characteristic feature in Nigeria. “The questio...

Read more
Share this page with your friends




whatsapp